CN108737400A - Stream medium data mandate broadcasting and terminal check method - Google Patents

Stream medium data mandate broadcasting and terminal check method Download PDF

Info

Publication number
CN108737400A
CN108737400A CN201810437959.XA CN201810437959A CN108737400A CN 108737400 A CN108737400 A CN 108737400A CN 201810437959 A CN201810437959 A CN 201810437959A CN 108737400 A CN108737400 A CN 108737400A
Authority
CN
China
Prior art keywords
terminal
medium data
stream medium
key
broadcasting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810437959.XA
Other languages
Chinese (zh)
Inventor
潘芳
谭肖平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yoostar Technology Co Ltd
Original Assignee
Yoostar Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yoostar Technology Co Ltd filed Critical Yoostar Technology Co Ltd
Priority to CN201810437959.XA priority Critical patent/CN108737400A/en
Publication of CN108737400A publication Critical patent/CN108737400A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • H04N21/25875Management of end-user data involving end-user authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26613Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Graphics (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The present invention relates to technical field of data transmission.The present invention solves the problems, such as that computations are complicated during the safety issue of prior art data transmission and terminal check, are unfavorable for mini system realization.The stream medium data mandate broadcasting of the present invention and terminal check method, technical solution mainly play end and terminal interaction key, by cryptographic calculation to key and compare, carry out terminal legality certification;Certification produces shared key after passing through, and carries out terminal identity information encryption and decryption with the shared key, plays end to terminal transmission stream medium data and open service with legal identity.The invention has the advantages that high system safety, encryption method is difficult theoretically to crack;It calculates and relatively simplifies, realize simpler.The present invention further reduces system scale, is very suitable for the encryption and decryption of chip-scale, advantageously reduces cost, especially terminal system is greatly simplified, and user cost is advantageously reduced.

Description

Stream medium data mandate broadcasting and terminal check method
Technical field
The present invention relates to data transmission technology, more particularly to the authorized transmissions of data and receiving terminal (or being terminal) are legal Property judgment technology, in particular to stream medium data mandate broadcasting and terminal check method.
Background technology
Growing with the communication technology, especially the development of Fibre Optical Communication Technology, DTV are promoted rapidly, Also gradually increased using the user of DTV.Wherein, set-top box (digital video switching box) is using needed for DTV One of equipment.However, the access identity of set-top box is usurped, phenomenon is commonplace, to safeguard the power of consumer and service provider Benefit, the prior art provide some and confirm the whether legal scheme of set-top box.The confirmation set-top box legitimacy primarily now used Scheme be abstract confirmation scheme.
Abstract confirms that (Digest authentication) is used for providing the safety for confirming higher level than basis.? About its description in RFC2617, it is a kind of confirmation model based on challenge-response pattern that abstract, which confirms,.
Abstract confirms that the operation principle confirmed with basis is much like, and user first sends out a request without confirming certificate, Web server replys a response for carrying WWW-Authenticate, indicates and accesses the requested resource certificate of necessity.But It is to confirm that the username and password for sending and being encoded with Base 64 is different with basis, server allows client to select one in abstract confirms A random number (is referred to as " nonce "), and then browser generates an eap-message digest using a unidirectional encryption function (message digest), the abstract are about user name, password, given nonce values, HTTP method and requested URL.Message digest function is also referred to as hashing algorithm, is that one kind is easy to calculate in one direction, negative direction is infeasible Encryption Algorithm.Confirm with basis and compare, the Base 64 during decoded base confirms is easy to accomplish.In server password In, it is possible to specify arbitrary hashing algorithm.In RFC 2617, describe using MD5 hash functions as default algorithm.
During stating confirmation in realization, there are the following problems:
The program is generated using digest algorithm during confirming to identity and is made a summary, and the input of the digest algorithm exists There are corresponding cleartext information, digest algorithm to be easy to be stolen in network exchange message before summary info transmission, to Reduce the accuracy of identity validation.And digest algorithm can not update, once being cracked, the access identity of actual user will It is usurped always, reduces the safety of access identity confirmation.
In fields such as communication, data transmission, content protectings, receiving terminal identity validation and key agreement are also information security Basis.The purpose of identity validation seeks to confirm the identity of ginseng person, to be subsequent data transmission, secure communication and imparting Associated rights are ready.
Identity validation can technically be divided into:Confirmation based on password, the confirmation based on symmetric key and based on public affairs The confirmation three classes of key system.It can be divided into from realization method:There are the confirmation and participated in really without third party that third party participates in Recognize.Confirmation based on password is at present in internet, finance etc. since its simplicity is also being widely used, such as E-mail address The code entry of account, password of bank card etc..Confirmation based on symmetric key is also being widely used at present, such as inside IC card Confirm and external validation testing.The characteristics of both modes is exactly simple and practical, but safety is not high, it is easy to it is cracked, Occasion that can only be not high in security requirement, or be aided with other methods in the high occasion of security requirement and carry out safe guarantor Card could be practical.With the increase to security requirement, public key body has been generally used in the high occasion of security requirement at present The confirmation of system is exactly typically PKI (Public Key Infrastructure) mechanism, at present in internet, finance, electronics The fields such as commercial affairs have been obtained for largely using.Confirmation based on public key system, the public key algorithm packet of generally use in industry It includes with the RSA of three scholar's namings of Massachusetts Institute Technology (Rivest-Shamir-Adleman) Encryption Algorithm and ellipse Circle Encryption Algorithm (Ellipse Curve Cryptography ECC).Its main feature is that it is safe, the disadvantage is that operation is complicated, consumption More with resource, mini system is difficult to realize, and chip is realized more difficult.In addition, the confirmation of public key generally uses the side of digital certificate Formula confirms other side's identity, needs to exchange certificate during confirmation, and needs to carry out the legitimacy of the certificate of other side Verification, this will expend certain data bandwidth, also consumes larger computing resource, Streaming Media mandate play field application by To great limitation.
Invention content
The main purpose of the present invention is to provide a kind of stream medium data mandate broadcasting and terminal check methods, existing to solve Have during the safety issue and terminal check that technical data is transmitted that computations are complicated, are unfavorable for asking for mini system realization Topic.
To achieve the goals above, according to the one side of the specific embodiment of the invention, a kind of Streaming Media number is provided According to mandate broadcasting and terminal check method, which is characterized in that include the following steps:
S1, broadcasting end send its public key to terminal, its public key is sent to and plays end by terminal;
S2, end calculating V is playedA
Terminal calculates VB
S3, terminal are by VBIt sends to and plays end, play end and receive VBAfterwards, with VA、VBAs basis for estimation, if VA=VBThen eventually It is legal to hold, and continues subsequent step;Otherwise it is assumed that terminal is illegal, subsequent step is terminated;
S4, terminal are with VBIts identity information is encrypted for encryption key, and sends crypto identity information to broadcasting End;
S5, end is played with VAThe identity for being decrypted to obtain terminal to the crypto identity information of reception for decruption key is believed Breath;
S6, broadcasting end transmit stream medium data to the terminal with the identity information and/or open related service;
Wherein, c is related coefficient;R is recovery coefficicnt;M is modulus;C, r, m are positive integer;For twist vector; To play the public key at end;To play the private key at end;For the public key of terminal,For the private key of terminal; AndIt is n-dimensional vector, the integer that n is >=2;ForTransposed vector;ForTransposed vector;ForTransposed vector.
Further, n >=20.
Further, in step S2, after broadcasting end receives terminal public key, first judge whether it is legal, be then to continue subsequently Otherwise step terminates subsequent step.
Further,WithWith linear dependence,WithWith linear dependence.
Further, the broadcasting end is streaming media server.
Further, further include step S7:The public key and private key of streaming media server more new terminal.
Further, the terminal is set-top box.
Further, the identity information includes at least software version information, user's sequence number and the set-top box of set-top box IP address.
Further, step S1 further includes playing end to generate a random number RA, and send terminal to;
Step S2 further includes playing end to RA、VAOperation is encrypted and obtains RVA, terminal-pair RA VBCarry out identical encryption Operation obtains RVB
Step S3 is specially:Terminal is by RVBIt sends to and plays end, play end and receive RVBAfterwards, with RVA、RVBAs confirmation According to the two is identical, confirms success, otherwise confirms failure;
Step S4 is specially:Terminal is with RVBIts identity information is encrypted for encryption key, and by crypto identity information It sends to and plays end;
Step S5 is specially:End is played with RVAThe crypto identity information of reception is decrypted to obtain end for decruption key The identity information at end.
Further, the cryptographic calculation includes HASH operations or HMAC operations.
Of the invention and its further improved technical solution has an advantageous effect in that:
The public key and private key that terminal can obtain are to can not directly form system of linear equations, therefore it is directly broken to have no idea The encryption method of the present invention is solved, it is safe;
The selection of public key and private key can take certain measure, for example keep certain linear dependence, then of the invention Encryption method be difficult theoretically to crack;
It selects suitable parameter that can be further simplified calculating, keeps realization simpler, encryption chip can be further decreased Small scale is very beneficial for reducing cost.For example, each member in n-dimensional vector is selected as 2bit, then VA、VBPass through add operation It can be obtained.
Below in conjunction with the accompanying drawings and specific implementation mode the present invention is described further.The additional aspect of the present invention and excellent Point will be set forth in part in the description, and partly will become apparent from the description below, or practice through the invention It solves.
Description of the drawings
Fig. 1 is the system installing structure schematic diagram of embodiment;
Fig. 2 is the terminal check flow diagram of embodiment.
Wherein:
10 be broadcasting end;
20 be terminal;
P1 is the first step;
P2 is second step
P3 walks for third;
P4 is the 4th step
P5 is the 5th step;
P6 is the 6th step
P7 is the 7th step;
P8 is the 8th step
P9 is the 9th step.
Specific implementation mode
It should be noted that in the absence of conflict, specific implementation mode, embodiment in the application and therein Feature can be combined with each other.It lets us now refer to the figures and combines the following contents detailed description present invention.
In order to make those skilled in the art be better understood from the present invention program, below in conjunction with specific embodiment party of the present invention Formula, embodiment carry out clear, complete description to the technical solution in the specific embodiment of the invention, embodiment, it is clear that are retouched The embodiment stated is only a part of the embodiment of the present invention, instead of all the embodiments.Based on the specific implementation in the present invention Mode, embodiment, the every other reality that those of ordinary skill in the art are obtained without making creative work Mode, embodiment are applied, the scope of protection of the invention should be all belonged to.
First, to play end and terminal provide public key and private key and set related coefficient c, recovery coefficicnt r, modulus m and Twist vectorWherein, c, r, m are positive integer.These parameters are only authorized to software developer or chip development quotient, not right Outer disclosure.Key can be provided by third party, can also be provided by playing end.
Broadcasting end as streaming media server is in addition to there is a pair of mating public keyAnd private keyOutside, it can also preserve The public key of other-endAs legal identity list.
Cipher key store can also be had by playing end, preserve or generate related coefficient c, recovery coefficicnt r, modulus m and other ends The public key at endAnd private keyAs key providing person, and can be that other-end updates public keyAnd private key
In key code system, usual private key requires holder's secret to preserve, can not be to outward leakage.
Above-mentioned public key and private key and twist vectorIt is n-dimensional vector, the positive integer that n is >=2.
It is as follows to the confirmation process of terminal that the present invention plays end:
Step 1 plays end by its public keySend terminal to, terminal is by its public keyIt sends to and plays end.
Step 2, broadcasting end receive terminal public keyAfter calculate VAEventually End, which receives, plays end public keyAfter calculate VB
In this step, it plays end and receives terminal public keyAfterwards, it can first judge public keyLegitimacy.For example pass through letter Single comparison, looks at public keyWith play whether public key that end preserves identical to confirm whether it legal.If public keyItself With regard to illegal, then it need not calculate and just terminate subsequent step, system resource can be saved, accelerate flow progress.
Step 3, terminal are by VBIt sends to and plays end.It plays end and receives VBAfterwards, with VA、VBAs basis for estimation, if VA=VB That is congruence expression:It sets up, then terminal is to close Method equipment, can be after the identity information for obtaining terminal to terminal transmission stream medium data.If VA≠VBThen think that terminal is non- Method equipment, so that it may to terminate subsequent step at once.So VA、VBAlso commonly known as parameters for authentication.
After step 4, terminal are by confirmation, with VBIts identity information is encrypted for encryption key, and by crypto identity Information, which is sent to, plays end.
Step 5 plays end with VAThe crypto identity information of reception is decrypted for decruption key to obtain the identity of terminal Information.
Step 6 includes software version information, user's sequence number and IP address due to the identity information of terminal, play end to Terminal with the IP address transmits stream medium data, or to the open-destination related service with user's sequence number.This In related service be typically end user requirements provide service product, such as obtain certain permission, inquiry account information.
Embodiment 1
For this example using streaming media server as end is played, terminal is exactly common set-top box.
This example system installing structure is connect by communication network with k (k >=1) a terminal as shown in Figure 1, playing end, can be with Confirmation, transmission key and data etc. are initiated to these terminals.
It is a kind of unidirectional confirmation process to the confirmation process of terminal that this example, which plays end,.It is unidirectional to confirm to refer to playing end to confirm eventually End, and terminal need not confirm the case where playing end.This legitimacy confirms that process can greatly reduce the cryptographic calculation of terminal Amount, greatly simplifies terminal system structure, is very suitable for confirmation scene of the streaming media server to terminal set top box.
This example plays end to the confirmation flow of terminal as shown in Fig. 2, including:
First step P1
It plays end and sets related coefficient c, recovery coefficicnt r, modulus m and twist vector in the cipher key store of oneselfHere C, r, m are positive integer.
End is played from the cipher key store of oneself to each terminal distribution a pair of public keyAnd private keyAnd provide related coefficient C, recovery coefficicnt r, modulus m and twist vector
Playing the cipher key store at end must maintain secrecy, and the private key of terminal must also maintain secrecy.
The cancellation to some designated terminal may be implemented to different in the public/private keys of each terminal in this way.
For each terminal by public/private keys to preserving in a device, wherein private key requires secret preservation, does not allow other terminals It accesses.Public key can allow other terminal accesses.
If the public key for playing end isPrivate key isThe public key of terminal to be confirmedPrivate key is
Above-mentioned all public keys and private key and twist vectorIt is n-dimensional vector.For this broadcasting end of this example to set-top box The confirmation of legitimacy, n=20 can be met the requirements, and operand is again little, is very suitable for this mini system of set-top box and answers With.
Second step P2
It plays end and initiates confirmation request, generate a random number RA, and with its public keySend terminal to together.
In the step, due to RARandomness, the random number R that each confirmation process can be made to generateADifference further increases Add the difficulty decoded, strengthens confidentiality.
Third walks P3
Terminal obtains confirmation request, is receiving the random number R for playing endAAnd public keyAfterwards, by the public key of oneselfIt passes It gives and plays end.
4th step P4
Play the public key that end receives terminal transmissionAfterwards, it checksIt is whether legal, it is to continue subsequent step, otherwise eventually Fluid stopping journey.
5th step P5
Play end
Calculate VA
In formula,ForTransposed vector;ForTransposed vector;
To RA、VAOperation is encrypted and obtains RVA.Here the encryptions such as HASH operations, HMAC operations may be used in cryptographic calculation Algorithm.
Terminal
Calculate VB
In formula,ForTransposed vector;
To RA VBIt carries out identical cryptographic calculation and obtains RVB
Here more than once cryptographic calculation so that parameters for authentication RVBConfidentiality is stronger, and decoding is trapped in transmission process Difficulty bigger, and the increased operand of terminal is very limited.
6th step P6
Terminal is by RVBIt sends to and plays end, play end and receive RVBAfterwards, with RVA、RVBAs the basis of confirmation, the two is identical Then confirm success, otherwise confirms failure.
7th step P7
Terminal is with RVBIts identity information is encrypted for encryption key, and crypto identity information is sent to and plays end.
8th step P8
End is played with RVAThe crypto identity information of reception is decrypted for decruption key to obtain the identity information of terminal.
9th step P9
End is played according to the obtained terminal identity information of decryption, stream medium data is transmitted to the legal terminal, or to this Legal terminal opens related service.
In this example,
It,, can be periodically or non-periodically to machine top as the streaming media server for playing end in order to reinforce confidentiality in this example The public key of boxAnd private keyIt is updated.Renewal process can carry out after confirmation successfully completes related business data transmission, Streaming media server provides a pair of new public key from cipher key store to set-top boxAnd private keyIt can.
It can also be set as the streaming media server for playing endWithAndWithLinear dependence, into one Step enhancing key attack difficulty, improves the reliability for playing end and terminal interaction.
It will be evident that streaming media server can also periodically or non-periodically transposition encryption parameter, such as related coefficient c, reduction system Number r, modulus m and twist vectorDeng.
It will be evident that streaming media server can also periodically or non-periodically be converted to RA、VAThe encryption that operation is encrypted is calculated Method, and new Encryption Algorithm is notified terminal set top box.
Since key updating, parameter transformation, Encryption Algorithm etc. are mainly realized in streaming media server, and as broadcasting end Streaming media server usually possessed by related authoritative institution, and have powerful system function and data-handling capacity, this This configuration mode is invented, not only there is powerful confidentiality, but also the operand of set-top box can be reduced, simplifies set-top-box system knot Structure is very suitable for the application scenarios of+k set-top boxes of a streaming media server.

Claims (10)

1. stream medium data mandate broadcasting and terminal check method, which is characterized in that include the following steps:
S1, broadcasting end send its public key to terminal, its public key is sent to and plays end by terminal;
S2, end calculating V is playedA
Terminal calculates VB
S3, terminal are by VBIt sends to and plays end, play end and receive VBAfterwards, with VA、VBAs basis for estimation, if VA=VBThen terminal is closed Method continues subsequent step;Otherwise it is assumed that terminal is illegal, subsequent step is terminated;
S4, terminal are with VBIts identity information is encrypted for encryption key, and crypto identity information is sent to and plays end;
S5, end is played with VAThe crypto identity information of reception is decrypted for decruption key to obtain the identity information of terminal;
S6, broadcasting end transmit stream medium data to the terminal with the identity information and/or open related service;
Wherein, c is related coefficient;R is recovery coefficicnt;M is modulus;C, r, m are positive integer;For twist vector;To broadcast Put the public key at end;To play the private key at end;For the public key of terminal,For the private key of terminal; AndIt is n-dimensional vector, the integer that n is >=2;ForTransposed vector;ForTransposed vector;ForTransposition to Amount.
2. stream medium data mandate broadcasting according to claim 1 and terminal check method, which is characterized in that the n >= 20。
3. stream medium data mandate broadcasting according to claim 1 and terminal check method, which is characterized in that step S2 In, after broadcasting end receives terminal public key, first judges whether it is legal, is, continue subsequent step, otherwise terminate subsequent step.
4. stream medium data mandate broadcasting according to claim 1 and terminal check method, which is characterized in thatWithTool Linear correlation,WithWith linear dependence.
5. stream medium data mandate broadcasting according to claim 1 and terminal check method, which is characterized in that the broadcasting End is streaming media server.
6. stream medium data mandate broadcasting according to claim 5 and terminal check method, which is characterized in that further include step Rapid S7:The public key and private key of streaming media server more new terminal.
7. stream medium data mandate broadcasting according to claim 1 and terminal check method, which is characterized in that the terminal For set-top box.
8. stream medium data mandate broadcasting according to claim 7 and terminal check method, which is characterized in that the identity Information includes at least the IP address of the software version information of set-top box, user's sequence number and set-top box.
9. the stream medium data mandate broadcasting and terminal check method, feature according to above-mentioned any one claim exist In step S1 further includes playing end to generate a random number RA, and send terminal to;
Step S2 further includes playing end to RA、VAOperation is encrypted and obtains RVA, terminal-pair RA VBCarry out identical cryptographic calculation Obtain RVB
Step S3 is specially:Terminal is by RVBIt sends to and plays end, play end and receive RVBAfterwards, with RVA、RVBAs the basis of confirmation, The two is identical, confirms success, otherwise confirms failure;
Step S4 is specially:Terminal is with RVBIts identity information is encrypted for encryption key, and crypto identity information is transmitted Give broadcasting end;
Step S5 is specially:End is played with RVAThe crypto identity information of reception is decrypted for decruption key to obtain the body of terminal Part information.
10. stream medium data mandate broadcasting according to claim 9 and terminal check method, which is characterized in that described to add Close operation includes HASH operations, HMAC operations.
CN201810437959.XA 2018-05-09 2018-05-09 Stream medium data mandate broadcasting and terminal check method Pending CN108737400A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810437959.XA CN108737400A (en) 2018-05-09 2018-05-09 Stream medium data mandate broadcasting and terminal check method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810437959.XA CN108737400A (en) 2018-05-09 2018-05-09 Stream medium data mandate broadcasting and terminal check method

Publications (1)

Publication Number Publication Date
CN108737400A true CN108737400A (en) 2018-11-02

Family

ID=63938135

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810437959.XA Pending CN108737400A (en) 2018-05-09 2018-05-09 Stream medium data mandate broadcasting and terminal check method

Country Status (1)

Country Link
CN (1) CN108737400A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101499908A (en) * 2009-03-20 2009-08-05 四川长虹电器股份有限公司 Method for identity authentication and shared cipher key generation
CN102438172A (en) * 2011-03-28 2012-05-02 苏州汉辰数字科技有限公司 System for realizing video-on-demand (VOD) and push VOD by cloud computing technology and method thereof
CN102916814A (en) * 2012-11-06 2013-02-06 四川虹微技术有限公司 Bidirectional authentication method based on matrix operation
CN103067333A (en) * 2011-10-18 2013-04-24 华为终端有限公司 Method for verifying set top box access identity and authentication server
CN106935242A (en) * 2015-12-30 2017-07-07 北京明朝万达科技股份有限公司 A kind of voice communication encryption system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101499908A (en) * 2009-03-20 2009-08-05 四川长虹电器股份有限公司 Method for identity authentication and shared cipher key generation
CN102438172A (en) * 2011-03-28 2012-05-02 苏州汉辰数字科技有限公司 System for realizing video-on-demand (VOD) and push VOD by cloud computing technology and method thereof
CN103067333A (en) * 2011-10-18 2013-04-24 华为终端有限公司 Method for verifying set top box access identity and authentication server
CN102916814A (en) * 2012-11-06 2013-02-06 四川虹微技术有限公司 Bidirectional authentication method based on matrix operation
CN106935242A (en) * 2015-12-30 2017-07-07 北京明朝万达科技股份有限公司 A kind of voice communication encryption system and method

Similar Documents

Publication Publication Date Title
CN108599925B (en) Improved AKA identity authentication system and method based on quantum communication network
CN103763631B (en) Authentication method, server and television set
JP4617763B2 (en) Device authentication system, device authentication server, terminal device, device authentication method, and device authentication program
CN103051628B (en) Obtain the method and system of authentication token based on server
CN110932870B (en) Quantum communication service station key negotiation system and method
US9258113B2 (en) Username based key exchange
KR101237632B1 (en) Network helper for authentication between a token and verifiers
CN106789042B (en) Authentication key negotiation method for user in IBC domain to access resources in PKI domain
KR101634158B1 (en) Method for authenticating identity and generating share key
US20060195402A1 (en) Secure data transmission using undiscoverable or black data
Ghaffar et al. An improved authentication scheme for remote data access and sharing over cloud storage in cyber-physical-social-systems
TW200402981A (en) Methods for remotely changing a communications password
JP2008545353A (en) Establishing a reliable relationship between unknown communicating parties
US12010216B2 (en) Computer-implemented system and method for highly secure, high speed encryption and transmission of data
CN110198295A (en) Safety certifying method and device and storage medium
CN108599926B (en) HTTP-Digest improved AKA identity authentication system and method based on symmetric key pool
CN112351037B (en) Information processing method and device for secure communication
WO2018030289A1 (en) Ssl communication system, client, server, ssl communication method, and computer program
WO2023174038A9 (en) Data transmission method and related device
CN108616350B (en) HTTP-Digest class AKA identity authentication system and method based on symmetric key pool
US20200235915A1 (en) Computer-implemented system and method for highly secure, high speed encryption and transmission of data
JP5324813B2 (en) Key generation apparatus, certificate generation apparatus, service provision system, key generation method, certificate generation method, service provision method, and program
Tiwari et al. ACDAS: Authenticated controlled data access and sharing scheme for cloud storage
US20160315779A1 (en) Entity Authentication in Network
KR100456624B1 (en) Authentication and key agreement scheme for mobile network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181102